Movatterモバイル変換


[0]ホーム

URL:


EP2095603B1 - Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks - Google Patents

Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks
Download PDF

Info

Publication number
EP2095603B1
EP2095603B1EP07867263.1AEP07867263AEP2095603B1EP 2095603 B1EP2095603 B1EP 2095603B1EP 07867263 AEP07867263 AEP 07867263AEP 2095603 B1EP2095603 B1EP 2095603B1
Authority
EP
European Patent Office
Prior art keywords
denunciation
central filter
detector
message
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP07867263.1A
Other languages
German (de)
French (fr)
Other versions
EP2095603A2 (en
Inventor
Michael Barry Greenwald
Eric Henry Grosse
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent SASfiledCriticalAlcatel Lucent SAS
Publication of EP2095603A2publicationCriticalpatent/EP2095603A2/en
Application grantedgrantedCritical
Publication of EP2095603B1publicationCriticalpatent/EP2095603B1/en
Not-in-forcelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Description

    Cross-Reference to Related Application
  • The present application is related to United States Patent ApplicationUS 2007/0033650 A1 entitled "Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks by Target Victim Self-Identification and Control," and United States Patent ApplicationUS 2007/0030850 A1, entitled "Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks Based on Specified Source/Destination IP Address Pairs," each filed August 5, 2005, assigned to the assignee of the present invention.
  • Field of the Invention
  • The present invention relates to computer security techniques for packet-based communications networks, and more particularly, to methods and apparatus for detecting and denouncing unwanted traffic, such as a Denial of Service attack or another malicious attack, in such packet-based networks.
  • Background of the Invention
  • Malicious attacks, such as Denial-of-service (DoS) attacks, attempt to make computer resources unavailable to their intended users. For example, a DoS attack against a web server often causes the hosted web pages to be unavailable. DoS attacks can cause significant service disruptions when limited resources need to be allocated to the attackers instead of to legitimate users. The attacking machines typically inflict damage by sending a large number of Internet Protocol (IP) packets across the Internet, directed to the target victim of the attack. For example, a DoS attack can comprise attempts to "flood" a network, thereby preventing legitimate network traffic, or to disrupt a server by sending more requests than the server can handle, thereby preventing access to one or more services.
  • A number of techniques have been proposed or suggested for defending against such malicious attacks. For example, United States Patent ApplicationUS 2007/0033650 A1, entitled "Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks by Target Victim Self-Identification and Control," and United States Patent ApplicationUS 2007/0030850 A1, entitled ''Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks Based on Specified Source/Destination IP Address Pairs," disclose techniques for detecting and denouncing DoS attacks.
  • Systems that defend against such malicious attacks typically employ a detector associated with the customer network and a central filter in the network of the service provider to protect the customer network against malicious attacks. Generally, the detector will detect a malicious attack against the customer network and will send one or more denunciation or notification messages to the central filter. For example, upon determining that a malicious attack is being perpetrated on the customer network, the detector may transmit one or more source/destination IP address pairs to the central filter, which causes the service provider to limit the transmission of IP packets whose source IP address and destination IP address match those of any of the transmitted source/destination IP address pairs, thereby limiting (or eliminating) the malicious attack. The detector is typically located close to the customer network.
  • The malicious attack, however, typically leads to such heavy packet loss that the control messages from the central filter to the detector are likely to be lost or long delayed. In addition, the detector is likely to be busy and under a heavy load during a malicious attack. Existing systems that defend against such malicious attacks typically employ Transport Layer Security (TLS), Secure Socket Layer (SSL), a Secure Shell (SSH) or another Transmission Control Protocol (TCP) based protocols requiring an acknowledgement for sending control messages to the central filter. Such channels are typically sufficient, except during a malicious attack. During a malicious attack, the acknowledgement from the central filter may not be received by the detector, or may arrive at the detector at a time when the input buffers of the detector are overloaded. Generally, the detector cannot continue processing until all prior denunciation messages are properly acknowledged by the central filter.
  • US 2006/0248588 A1 discloses a method for defending denial of service attacks in an inter-networked environment. Multiple routers may collaboratively mitigate the effect of the DoS attack. In one embodiment, a DoS notification is sent to the routers using an extended ICMP protocol.
  • A need therefore exists for methods and apparatus for reliably delivering control messages to the central filter during a malicious attack in one or more packet networks without requiring responses from the central filter to the detector.
  • Summary of the Invention
  • A method according toclaim 1 and an apparatus according toclaim 7 are provided for reliably delivering control messages to a central filter, for example, during a malicious attack, in one or more packet networks without requiring responses or acknowledgements from the central filter to the detector. According to one aspect of the invention, a detector defends against unwanted traffic by a target victim by determining that unwanted traffic is received by the target victim based on an analysis of packets received from one or more source IP addresses; and transmitting a denunciation message to a central filter associated with a service provider, the denunciation message identifying a source address of at least one source computing device whose transmission of packets to the target victim is specified in the denunciation message to be limited or dropped, wherein the denunciation message is transmitted using a denunciation protocol comprising a first reliable TLS channel and a second UDP channel that does not require an acknowledgement from said central filter, wherein authentification information is transmitted using the first channel of the denunciation protocol and said denunciation message is transmitted using the second channel of the denunciation protocol.
  • According to further aspects of the invention, the denunciation messages can be sent redundantly to the central filter and are preferably self contained. The central filter and detectors share state information, and optionally maintain any changes to the state information.
  • According to a further aspect of the invention, the disclosed Denunciation Protocol includes one or more features to avoid a malicious attack aimed at the Denunciation Protocol itself. For example, the denunciation message optionally includes a sequence number that (i) allows conflicting denunciation messages from a plurality of the target victims to be reconciled; (ii) allows a malicious attack aimed at the Denunciation Protocol to he avoided; and (iii) allows duplicate copies of the denunciation message to be discarded.
  • A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
  • Brief Description of the Drawings
    • FIG. 1 illustrates a network environment in which the present invention may operate;
    • FIG. 2 is a schematic block diagram of the central filter system ofFIG. 1;
    • FIG. 3 is a schematic block diagram of the detector ofFIG. 1;
    • FIGS. 4 and5 are flow charts describing exemplary implementations of a denial of service filtering process incorporating features of the present invention;
    • FIG. 6 illustrates an HMAC key for UDP requests, prcpcnded to the UDP packet; and
    • FIG. 7 illustrates an exemplary layout of a DP record header and trailer within the secure reliable stream.
    Detailed Description
  • The present invention provides methods and apparatus for reliably delivering control messages to a central filter during a malicious attack in one or more packet networks.
  • According to the present invention, a Denunciation Protocol is provided for communications between a detector at the customer network and a central filter at the network of the service provider. The Denunciation Protocol comprises a pair of communication channels. A first communication channel is a reliable, secure authenticated stream, TLS channel. The second communication channel is an unreliable non-stream protocol. User Datagram Protocol (UDP) is employed to avoid the immediate acknowledgement that is required with conventional techniques that employ TCP-based protocols. In this manner, if there is heavy packet loss in the return path from the central filter to the detector, for example, due to a malicious attack, where the central filter acknowledgements would tend to be lost, the desired protection can still be achieved. In addition, redundant transmission of the control messages on the forward path from the detector to the central filter is used to overcome moderate packet loss on the forward path. Generally, it is preferable to send a number of redundant packets from the detector to the central filter, than to send any packets from the central filter to the detector during an attack.
  • FIG. 1 illustrates anetwork environment 100 in which the present invention may operate. As shown inFIG. 1, anenterprise network 150 protects itself against malicious attacks using adetector 300, as discussed further below in conjunction withFIG. 3. Theenterprise network 150 allows enterprise users to access the Internet or another network by means of aservice provider network 120. Theservice provider network 120 provides service to users of theenterprise network 150, and receives packets from various sources by means ofingress ports 115 and transmits them to the indicated destination in theenterprise network 150.
  • In one exemplary embodiment, thedetector 300 cooperates with acentral filter 200, discussed further below in conjunction withFIG. 2, to protect itself against malicious attacks. Generally, as discussed further below, thedetector 300 will detect a malicious attack, such as a Denial of Service attack, against theenterprise network 150 and will notify thecentral filter 200 maintained by the service provider.
  • Thecentral filter 200 serves to limit the traffic that reaches theenterprise network 150 by means of theservice provider network 120. Thedetector 300 typically sits behind the firewall in theenterprise network 150 and thedetector 300 typically sends denunciation messages to thecentral filter 200 of the ISP. Thedetector 300 andcentral filter 200 may be implemented based on United States Patent ApplicationUS 2007/0033650 entitled "Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks by Target Victim Self-Identification and Control," and United States Patent ApplicationUS 2007/0030850, entitled "Method and Apparatus for Defending Against Denial of Service Attacks in IP Networks Based on Specified Source/Destination IP Address Pairs," as modified herein to provide the features and functions of the present invention.
  • Thedetector 300, upon determining that a Denial of Service attack is being perpetrated on theenterprise network 150, transmits one or more source/destination IP address pairs to thecentral filter 200, which causes theservice provider network 120 to limit (e.g., block or rate limit) the transmission of IP packets whose source IP address and destination IP address match those of any of the transmitted source/destination IP address pairs, thereby limiting (or eliminating) the Denial of Service attack from one ormore source devices 110 to the attack victim within theenterprise network 150. Thedetector 300 optionally transmits the source/destination IP address pairs with use of anunreliable UDP connection 135 or the primary secureauthenticated connection 130. According to one aspect of the present invention, a Denunciation Protocol is provided for communications between thedetector 300 and thecentral filter 200.
  • The victim of a Denial of Service attack can thus "push back" by denouncing attackers to its service provider, which will, in response, update a table of source/destination IP address pairs that are to be blocked. More specifically, upon recognizing that an attack is taking place, the victim (enterprise network 150) will identify one or more pairs of source and destination IP addresses that are specified in packets deemed to be a part of the attack, and communicate those IP address pairs to the service provider for blocking by thecentral filter 200.
  • As shown inFIG. 1, packets destined to the subscriber (enterprise network 150) is classified into classes, generally corresponding to "good" and "bad" traffic. For example, good traffic from Category A 105-A is delivered (allowed) and bad traffic from Category B 105-B and Category N 105-N is rate-limited or dropped, respectively.Source computing devices 110 that send traffic to a destination address associated with theenterprise network 150 are classified into one of the N exemplary categories. Denunciations shift the boundary between good and bad traffic.
  • Note that, in accordance with certain illustrative embodiments, the attacker (i.e., the identified source IP address or addresses) need not be cut off completely from the network, but rather is prohibited only from sending packets to the victim (i.e., the identified destination IP address or addresses). This may be advantageous, particularly in the case where the identified source IP address or addresses represent a legitimate user which has been taken over (e.g., a zombie) for the given attack against the victim and related machines. Thus, the owner of the machine that was taken over may continue to use the system for legitimate purposes, while the attack being perpetrated on the victim (possibly unbeknownst to the legitimate user) is nonetheless advantageously thwarted. Moreover, note that the technique in accordance with such illustrative embodiments also advantageously provides protection from overly zealous identification of attackers by a given victim. Since, in accordance with the principles of the present invention, the identification of an attack is left to the discretion of the apparent victim, it is clearly advantageous that only traffic to the given victim is being cut off or restricted.
  • A malicious attack may be recognized by the victim by one or more algorithms of varying degrees of simplicity or sophistication, which are outside the scope of the present invention, but many of which will be obvious to those skilled in the art. For example, in accordance with one illustrative embodiment of the invention, packet traces may be examined and an attack may be identified based solely on the presence of very high traffic levels (e.g., high packet rates) from either a single identified source or a plurality of identified sources. It is noted that this is one conventional method of identifying the presence of a Denial of Service attack and will be familiar to those of ordinary skill in the art.
  • In other implementations, however, application based analysis of packet contents and application logs may be performed to identify packets, sequences of packets or actions having a suspicious nature, such as, for example, recognizing that there have been frequent database searches for non-existent database elements; recognizing that there have been multiple requests apparently from a human being which occur at a higher rate than a person could initiate them; identifying syntactically invalid requests; and identifying suspicious amounts of traffic at particularly sensitive times in the operation of a normally occurring activity. An example of the latter class of suspicious packets might be identified, for example, if a stock trading web site notices particularly disruptive traffic at a sensitive time during an imminent stock transaction. In further variations, a number of different indicia of a possible attack, which may include, for example, one or more of the above described situations, may be advantageously combined in a more sophisticated analysis to identify the presence of an attack.
  • The exemplary detection system can operate in one of two modes. When the zone is in a "default-drop" mode, the default behavior is to filter all traffic destined for the zone except traffic explicitly listed on the default-drop. Generally, in a default-drop mode, the filter will automatically drop all traffic unless explicit authorized (for example, matching a predefined allow filter). When the zone is in default-allow mode, on the other hand, all traffic to the subscriber is passed by the filter, except that traffic that explicitly matches a predefined drop filter.
  • FIG. 2 is a schematic block diagram of thecentral filter system 200 ofFIG. 1 that can implement the processes of the present invention. As shown inFIG. 2,memory 230 configures theprocessor 220 to implement the denial of service filtering methods, steps, and functions disclosed herein. Thememory 230 could be distributed or local and theprocessor 220 could be distributed or singular. Thememory 230 could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices. It should be noted that each distributed processor that makes upprocessor 220 generally contains its own addressable memory space. It should also be noted that some or all ofcomputer system 200 can be incorporated into an application-specific or general-use integrated circuit.
  • As shown inFIG. 2, theexemplary memory 230 includes a denial of servicefilter rule base 260 and one or more denial of service filtering processes 400, discussed further below in conjunction withFIG. 4. Generally, the exemplary denial of servicefilter rule base 260 is a conventional filter base containing source/destination address pairs associated with traffic that should be limited or allowed by thecentral filter 200. The denial ofservice filtering process 400 is an exemplary method for defending against Denial of Service or other attacks in accordance with the present invention.
  • Thecentral filter 200 may be implemented as a stand-alone box included in theservice provider network 120, or, alternatively, as a line card incorporated into otherwise conventional network elements that are already present in thenetwork 120. Moreover, in accordance with certain illustrative embodiments, thecentral filter 200 may be advantageously deployed by the carrier within thenetwork 120 at a location relatively close to the attack origins, or it may be initially placed to advantageously defend premium customers from attack.
  • FIG. 3 is a schematic block diagram of thedetector 300 ofFIG. 1 that can implement the processes of the present invention. As shown inFIG. 3,memory 330 configures theprocessor 320 to implement the denial of service filtering methods, steps, and functions disclosed herein. Thememory 330 could be distributed or local and theprocessor 320 could be distributed or singular. Thememory 330 could be implemented as an electrical, magnetic or optical memory, or any combination of these or otheryes types of storage devices. It should be noted that each distributed processor that makes upprocessor 320 generally contains its own addressable memory space. It should also be noted that some or all ofcomputer system 300 can be incorporated into an application-specific or general-use integrated circuit. As shown inFIG. 3, theexemplary memory 330 includes one or more denial of service detection processes 500, discussed further below in conjunction withFIG. 5.
  • FIG. 4 is a flow chart describing an exemplary implementation of a denial ofservice filtering process 400 incorporating features of the present invention. It is noted that the exemplary denial ofservice filtering process 400 is implemented for a "default-allow" mode. An implementation for a "default drop" mode would be readily apparent to a person of ordinary skill in the art. Generally, the denial ofservice filtering process 400 is an exemplary method for defending against Denial of Service or other attacks in accordance with the present invention. The illustrative denial ofservice filtering process 400 is performed at thecentral filter 200 and begins duringstep 410 by receiving a UDP indication from thedetector 300 that a Denial of Service attack is being perpetrated on a given target victim in theenterprise network 150.
  • Thereafter, duringstep 420, the network carrier receives one or more source/destination IP address pairs from thedetector 300 representative of IP packets that should be blocked in order to thwart the Denial of Service attack. Illustratively, the source IP addresses are those of the attacking (e.g., "zombie")computing devices 110 and the destination IP addresses are those associated with the target victim itself. The messages from thedetector 300 are transmitted in accordance with the DP, discussed below.
  • The network carrier then monitors the IP packet traffic duringstep 430 to identify IP packets whose source and destination IP addresses match one of the received source/destination IP address pairs. A test is performed duringstep 440 to determine if one or more packets match an address pair in the denial of servicefilter rule base 260.
  • If it is determined duringstep 440 that one or more packets match an address pair in the denial of servicefilter rule base 260, then the packets should be dropped or limited duringstep 460. If it was determined duringstep 440 that one or more packets do not match an address pair in the denial of servicefilter rule base 260, then the packets are allowed to be transmitted to theenterprise network 150 duringstep 470.
  • FIG. 5 is a flow chart describing an exemplary implementation of a denial ofservice detection process 500 incorporating features of the present invention. Generally, the denial ofservice detection process 500 is an exemplary method for defending against Denial of Service or other attacks in accordance with the present invention. The illustrative denial ofservice detection process 500 is performed by adetector 300 at a target victim and begins duringstep 510 by determining that a Denial of Service attack or another malicious is being perpetrated thereupon based on an analysis of received IP packets. Then, duringstep 520, one or more source/destination IP address pairs are identified as being representative of IP packets that should be blocked in order to thwart the Denial of Service attack. (Illustratively, the source IP addresses are those of the attacking "zombie"machines 110 and the destination IP addresses are those associated with the target victim itself.) Finally, duringstep 530, the identified source/destination IP address pairs are transmitted to thecentral filter 200 of the victim's carrier network using the disclosed DP to enable the carrier network to block transmission of IP packets having matching source and destination IP addresses.
  • Denunciation Protocol
  • In one exemplary implementation, the Denunciation Protocol (DP) communication channel between adetector 300 and thecentral filter 200 consists of a UDP port for denunciations and a TLS connection for most other communications. DP transactions are of two types. The first, over UDP, consists of a request packet from thedetector 300 to thecentral filter 200, possibly answered by an optional response from thecentral filter 200. The second, typically over TLSv1, consists of an SSL "record", eventually answered in a corresponding record. Most DP transactions are originated by thedetector 300. According to one aspect of the present invention, most DP requests do not require responses or acknowledgements.
  • The basic DP transaction is a denunciation from thedetector 300 to thecentral filter 200. Eachdetector 300 speaks on behalf of a "zone," a set of IP addresses that is a subset of the IP addresses owned by the subscriber (enterprise network 150). Thedetector 300 is said to "belong" to that zone. Thedetector 300 denounces traffic destined for the zone to which it belongs. (The IP address of thedetector 300 itself does not have to be part of the zone to which it belongs.)
  • All denunciation transactions are originated by thedetector 300. Denunciations from the subscriber are likely to be transmitted at a time that the subscriber is least likely to want to receive packets - when it is overloaded. Although it is also possible (or even likely) that the packet loss rate on the path from the subscriber to thecentral filter 200 may be higher than usual, and that thecentral filter 200 may be somewhat busier than usual, at that time, too, it is unlikely that the inbound path from the subscriber is as critically overloaded as the path to the subscriber, which is under attack. The path from the subscriber to thecentral filter 200 is within the service provider's network. Therefore, the disclosed DP tries to avoid launching any traffic towards the subscriber at denunciation time. Thus, denunciations are not sent reliably - no acknowledgement is received from thecentral filter 200.
  • Rather, the subscriber preferably sends multiple copies of each denunciation request, rather than have thecentral filter 200 send even one response. The multiple copies increase the probability that the denunciation request arrives safely at thecentral filter 200. For example, if five copies are sent, and packets are dropped at random, then even if the packet loss rate is 20% (and drop rates are typically well under 5%) the odds are extremely high that at least one copy of the request will have arrived. With these exemplary figures (a 20% packet loss rate and five copies), assuming that packet transmissions are spread out so that all losses are independent, the odds are still greater than 99.96% that at least one copy gets through.
  • This same reasoning also warrants making each packet self contained, so as not to depend unnecessarily on packets arriving in order. As previously indicated, DP transactions are generally initiated by the enterprise (through the detector 300), and none by thecentral filter 200. This is motivated partly by the above described considerations, as well as to maintain a request/response model, in order to be friendlier to firewalls around the enterprise, and increase the likelihood that DP packets can safely get through.
  • Thecentral filter 200 determines which filter rules are officially installed. Adetector 300 merely issues denunciations to thecentral filter 200. There is no ironclad guarantee that a denunciation will reach thecentral filter 200. Further, more than onedetector 300 can denounce hostile sources for a given zone of destinations. Consequently, adetector 300 cannot know, with certainty, the set of installed filters. It is desirable that the subscriber know which filters actually are installed, which never arrived at thecentral filter 200, and which have been removed or created byother detectors 300, or due to conflict (see below). To this end, when things calm down somewhat, the subscriber may request a status report from thecentral filter 200. The status report lists which requests arrived, which filters were installed, and other information (detailed below).
  • In order to receive the status reliably and bootstrap the authentication, the disclosed DP provides a (reliable) communication channel (TLS) between eachdetector 300 andcentral filter 200.
  • Thecentral filter 200 and eachdetector 300 must coordinate in order to maintain some shared state. The most obvious shared state is the set of installed filter rules, but there is also other shared state related to DP itself, such as sequence numbers of denunciations and information for authentication. The exemplary embodiment only requires moderately synchronized clocks. To avoid the need to run anything unnecessary on adetector 300 or acentral filter 200, the disclosed DP provides very coarse clock "synchronization", so that there is no need to run with a Network Time Protocol (NTP), as discussed below in a section entitled "B. Authentication." Many subscribers will wish to run NTP anyway on thedetector 300, to simplify event correlation across the enterprise network (but it is not required for the DP to operate).
  • For both filter and protocol state, the disclosed DP mandates that thedetector 300 andcentral filter 200 agree, reliably, on an initial shared state, and then both sides keep track of changes to the state as time passes. In case of a discrepancy between adetector 300 and thecentral filter 200, thecentral filter 200 always has the "true" picture of the shared state. The amount of filter state to keep synchronized is up to the detector 300 (it may not care about past denunciations at all, and base all of its analysis on the current traffic flow). The protocol state is required by DP.
  • Adetector 300 can re-synchronize filter state with thecentral filter 200 by means of periodic status requests. Typically, thecentral filter 200 returns only the filter state changes since the last status request (although it can also return all currently active filters, regardless of when installed, if so requested.) Typically, thecentral filter 200 returns the filters of alldetectors 300 in the zone, but, if requested, it can return only the denunciations requested by thisdetector 300.
  • Adetector 300 can re-synchronize sequence numbers and authentication keys by means of a synchronize request. In a synchronize transaction, thedetector 300 unilaterally chooses a new sequence number and thecentral filter 200 generates a new session key for authentication.
  • In the case that adetector 300 crashes, or somehow loses information, thedetector 300 can request all filter rules, not just recent ones. At any time, adetector 300 can renegotiate authentication information (see below) for denunciations.
  • In the event that thecentral filter 200 resets all filter rules (zone change, mode change, or some fatal DB crash), thecentral filter 200 deliberately forgets its association with thedetector 300, prompting the next detector transaction to return a resynch response from thecentral filter 200. When thedetector 300 resynchronizes with thecentral filter 200, thecentral filter 200 can tell thedetector 300 that its previous state is no longer valid; it needs to request a full status.
  • Thecentral filter 200 may receive malformed or unauthenticated packets. In such cases, thecentral filter 200 returns an error packet to the (legitimate) sender, for example, up to a maximum rate of one error packet every 30 seconds to each host. The rate limit can be set, for example, to avoid attackers from using the Denunciation Protocol to launch a Denial of Service attack.
  • Conflicting Denunciations
  • Denunciations can specify several possible different actions in the event of a packet matching a classification. Consequently, conflicts may occur. For example, onedetector 300 may specify that an entire subnet seems to be launching web crawlers, and should be rate limited. Anotherdetector 300 may detect a particular host in that subnet launching real attacks, and specify that all packets from that host should be dropped. In such a case of conflict, the latter rule is unequivocally more specific than the former rule: it refers to a single host, and it says to drop rather than just rate limit the source. In such a conflict, it is reasonable to argue that the stricter rule applies. However, suppose the requested actions were reversed: onedetector 300 requests rate limiting on a single source, while anotherdetector 300 requests that all packets from the subnet (including that source) be dropped. One could argue that the former rule is more specific (it refers to a single host, not the whole subnet), or equally well argue that the latter rule is stricter (it says to drop packets, rather than just thin them). The exemplary embodiment adopts the convention that the most specific source address takes priority.
  • Nevertheless, for clarity, the best practice is fordetectors 300 to avoid issuing conflicting rules. It is always possible to retract the existing conflicting rule before issuing a new set. However, given the unreliability of denunciations it is conceivable that thecentral filter 200 will receive the new rule before discovering that the earlier, conflicting, rule was retracted. Further, givenmultiple detectors 300 managing the same zone, it is possible that twodetectors 300 may independently issue conflicting denunciations without renouncing the conflict.
  • The behavior of thecentral filter 200 when encountering conflicts should be specified. In one exemplary implementation, the basic policy is that in the case of conflict (two rules with the same specification of source address, but two different actions or reasons), then the later rules override earlier rules. ("Later" refers to when the rule arrives at Central.)
  • DP Protocol AlgorithmsA. Reliable Transmission
  • As discussed above, packets should be sent from thedetector 300 to thecentral filter 200, and not sent in the other direction from thecentral filter 200 to thedetector 300. Further, each packet can stand by itself and does not require in-order delivery. Consequently, rather than guaranteeing that each denunciation packet arrive, and arrive in sequence, the disclosed DP opts to probabilistically improve the odds of successful arrival by transmitting multiple copies of each packet. DP denunciation requests are sent in UDP packets to a port on thecentral filter 200 that is specified, for example, in the response to a SYNCH request. In general, each denunciation packet is sentp times, and an acknowledgement is not required. In one exemplary implementation,p is fixed at 5, and no formal requirements on packet pacing are provided.
  • For ordering requirements (given the rule that in the case of directly conflicting filter rules where the conflict resolution rules do not choose a clear winner, the latest rule overrides earlier rules), DP sequence numbers are passed up to the application in order to determine the transmission order. Thecentral filter 200 acts as a serializer for denunciations frommultiple detectors 300. The requests from asingle detector 300 are ordered unambiguously by sequence number. The order of the interleaving is unilaterally decided by thecentral filter 200. Thecentral filter 200 remembers where, in the global order, eachdetector 300 last received a status response.
  • The intent behind sending multiple packets is to ensure that at least one copy of each packet arrives at thecentral filter 200, not to flood thecentral filter 200 with packets. Further, attackers should not have a point of leverage with which to launch DoS attacks on the disclosed DP. Thecentral filter 200 should process, on average, one packet per transaction. The requirement that thecentral filter 200 authenticate each packet, to be certain it was sent by thecorrect detector 300, means that packet processing may be expensive.
  • Most redundant packets can be discarded without expensive computations. In one implementation, the cheapest tests are performed first. For example, the sequence number is unencrypted and is computationally cheap to check for denunciation requests. Similarly, it is also cheap to check whether the detector name is known. Duplicate requests and sequence numbers out of range, are easy to discard before performing other tests.
  • In the disclosed DP, denunciation transactions are initiated by adetector 300 over UDP. The DP maintains a separate TLS connection (over TCP) for other requests.
  • B. Authentication
  • The basic authentication mechanism for DP in the exemplary implementation is an authentication handshake provided by TLSv1 with client certificates. The public key of the trusted ISP Certificate Authority is pre-loaded into thecentral filter 200 and eachdetector 300. Eachdetector 300 and thecentral filter 200 has a certificate for its public key signed by that Certificate Authority (CA). In addition, thesubscriber detector 300 is provided with the fully qualified domain name of thecentral filter 200, which is also the CN part of the server certificate Subject.
  • The key is associated with the detector's "name", not its IP address, which may change for any number of reasons. As noted below, the DP enforces a maximum of onedetector 300 with a given name at any time. Following the standard TLS protocol, thecentral filter 200 sends a Certificate Request message specifying that it will accept only a certificate signed by the CA. Thedetector 300 responds with two messages as part of the client authentication process. First, thedetector 300 provides a certificate containing the detector's name and the detector's public key. Second, thedetector 300 sends a Certificate Verify message containing a digest of all of the TLS handshake messages signed by the detector's private key. Thecentral filter 200 can now authenticate the client as being thedetector 300 mentioned in the certificate.
  • Once the TLSv1 connection is established, thecentral filter 200 should use this secure encrypted channel to transmit a randomly chosen 160 bit secret nonce to thedetector 300 before any denunciations can be issued over UDP.
  • Every DP denunciation packet is authenticated. In one exemplary embodiment, denunciations in the disclosed DP are authenticated by a cryptographic hash of (a) the UDP packet contents, (b) a time counter (number of "units" since RSTART, where the length of a "unit" and the time of RSTART are established during synchronization). (c) the secret nonce, and (d) the DP port number used by the TLS channel. (b) is a minimal defense against replay attacks, (c) authenticates thedetector 300 to thecentral filter 200. The MAC function used in the exemplary embodiment is HMAC-SHA1 (see Internet RFC 2104 for details), and the extra fields above are used as the HMAC key.
  • A 20-bit sequence number can be included inside the packet, and assume that each server sends fewer than 220 requests before the unit counter is incremented. Endpoints of DP only accept the first valid packet with a given sequence number. By the time the sequence number wraps around, the unit counter has been incremented to defend against simple replay attacks. Thedetector 300 includes the low order bit of the number of the unit counter as the high order bit (21st bit) of the sequence numbers. This allows the "date" (number of units since RSTART time) to change on thedetector 300 at an arbitrary time with respect to thecentral filter 200, and thecentral filter 200 can still figure out what the hidden date is (as long as there is at least one synchronization exchange per "day" [unit]). This allows the need for tightly synchronized clocks to be avoided.
  • In the unlikely case that thedetector 300 attempts to send more than 220 packets within a time unit, it should request a new secret nonce from thecentral filter 200. Thedetector 300 chooses the length of a unit (expressed as a fraction of a day) to make it unlikely that the sequence number wraps around.
  • It may seem that computing these cryptographic hashes could be expensive, and the expense can be exacerbated by sending many copies of each packet. However, note that once a given sequence number is received successfully, any duplicates can be discarded without computing the hash. Randomly constructed packets from attackers are unlikely to be accepted, because the window of acceptable sequence numbers is very small compared to the entire sequence number space. Thecentral filter 200 discards packets outside of the expected window. Further windowing can be based on the detector name: detector names can be sparsely allocated - for example, on the order of 100 valid values within a 2 byte field.
  • If there is a concern that attackers might snoop denunciation requests, copying the detector name, capturing the sequence numbers, and then sending many bad copies of the last packet in the window, a method of fast discard can be provided that is protected against snoopers. In practice it is expected that this extra level of protection will not be necessary-that the cost of performing the SHA1 hash will not be a sufficient bottleneck at the receiver to justify this added complexity. Nevertheless, this Secure Fast Discard method is discussed below.
  • C. Secure Fast Discard
  • The Secure Fast Discard method is optional. Space for this optional method is provided in denunciation packets in an exemplary DP version, but this secure fast discard algorithm will not be enabled in DP unless, in practice, it is determined that this protection is needed.
  • The basic approach is as follows: each denunciation request will include an easy to compute L-bit string SL (L = 5, provisionally, so that the string fits into the padding of the sequence number field). SL is the result of a simple function of the sequence number and a pair of secret keys provided by thecentral filter 200 over the SSL channel. It is computationally inexpensive to check whether the packet is invalid-if SL is not the expected value the packet is discarded. It still requires a check of the cryptographic hash to determine whether the packet is valid - but this happens approximately once per sequence number.
  • When adetector 300 synchronizes the shared key for the HMAC-SHA1 hash with thecentral filter 200, thecentral filter 200 should also provide a string length L, a key length B, a B + L bit string S, and a small integer K, such that 1 ≤ K ≤ B. None of these are known to attackers, although L and B may change infrequently, and should not be considered "secret" in the same sense as S and K. For a denunciation request with sequence number s, SL is the L bit substring in S starting at bit position b. b is a function of s, B, and K. SL is inserted at the b0th position in the HMAC-SHAl hash of the packet (extending the length of the SHA1 hash by L bits).
  • If L = 5, and B = 1019, then the pattern won't repeat until roughly 220 denunciation packets - at which time a new nonce must be selected for the HMAC-SHA1 hash in any case. Given that the string SL will appear to be random to a snooping attacker, the simple check of SL should thin the stream of attacking packets by a factor of 2L. Choosing larger L, however, increases the odds that an attacker can reconstruct S, and then K - therefore L should be chosen so that 2L2L < B (meaning that L is O(logB)) to avoid this issue (so that every possible L bit substring is likely to appear more than once in S).
  • D. DP Message Service
  • The disclosed DP provides a means for thedetector 300 and thecentral filter 200 to send messages reliably to each other. SSL/TLS implements records in the stream. SSL records can be used as DP records, beginning each record with a DP record header simply describing the type of the record (such as STATUS, Message and Status reply). However, in our experience, not all TLS implementations preserve record boundaries in their API to clients (An SSL write (unless the data is too large) produce SSL records, but SSL read can return partial records, or multiple records). Consequently, to provide maximum portability across platforms, an exemplary embodiment of the DP (possibly redundantly) implements its own record marking protocol - within the SSL records. Ideally, one DP record should fit inside each SSL record - but the record protocol will work regardless. DP uses a start-of-record marker to begin the record, and an end-of-record marker to end. Each record begins with a type and a length field. The length field allows avoiding bit/byte-stuffing - it is legal for either start or end record markers to appear within a record. The length field is the number of bytes within the message, not including the header and trailer.
  • Although start and end markers are 4 byte sequences in the exemplary embodiment, there is no alignment requirement on DP messages. The body of the message can be an arbitrary length - the length does not have to be a multiple of 32 bits (4 bytes). The start and end markers allows record boundaries to be recovered in case the server or client issue a malformed record - you need only search for a sequence [end-of-record][start-of-record] followed by a length field that itself points to an [end-of-record] [start-of-record] pair.
  • E. Packet Formats, Version Numbers, and Compatibility
  • Modifications to the disclosed DP should be backward compatible. Incompatible modifications to protocol operations that utilize the SSL channel will allocate a new record-type-identifier, rather than reuse an old type with an incompatible format. Incompatible changes to denunciation transactions will require choosing a new DP port number as part of the modified DP specification. DP will detect a non-DP agent at the remote end of a DP channel in one of two ways. The remote end of an SSL connection will either fail to authenticate, or will fail to comply with the DP initial synchronization protocol. If the incompatibility is undetected, for some reason, during SSL connection establishment, then the cryptographic hash will fail for UDP traffic either because the remote end is not a DP, or it is using an incompatible version number for DP in the hash. This obviates the need for a version number or a magic number in the data transmitted by DP over the wire.
  • Packets and Operations
  • As previously indicated, thedetector 300 communicates with thecentral filter 200 over a DP channel. A DP channel should be currently established in order for thedetector 300 and thecentral filter 200 to communicate. Eachdetector 300 is bound to a specific instance ofcentral filter 200. Thecentral filter 200 will not communicate with adetector 300 that is not bound to it. Eachdetector 300 bound to a givencentral filter 200 has a numeric "name" used by thatcentral filter 200.
  • The first step in establishing a DP channel is initiating an SSL/TLS connection from thedetector 300 to thecentral filter 200. Thecentral filter 200 identifies the communicatingdetector 300 as authentic through the SSL/TLS authentication process. Thedetector 300 claims to be the name used in the certificate thedetector 300 provides to thecentral filter 200 in a client authentication phase of the TLS handshake. The name should be of a predefined form.
  • Once the TLS channel is established, thedetector 300 must send a synchronization request on the TLS channel. The TLS channel is not considered initialized until a synchronization request is sent from thedetector 300 to thecentral filter 200, and a synchronization acknowledgement is returned from thedetector 300 to thecentral filter 200. The exemplary synchronization request includes, among other values, the sequence number for the next denunciation transaction (the sequence numbers of each denunciation transaction will increase by one until the next synchronization request). It also initializes the length of a "time unit", and the random start time "RSTART". Thecentral filter 200 responds with a synchronization acknowledgement that includes a randomly generated 160 bit session key, and an indication of whether thedetector 300 can be satisfied with an incremental filter state, or whether it needs the full filter state.
  • After this exchange, thedetector 300 must establish the Path MTU, and request and receive the first status reply. At this point, the DP channel is established. As described above, there are four basic types of DP transactions: synchronize, denunciation, status query, and message. The first three transaction types (synchronize, denunciation, and status query) are all initiated by thedetector 300. However, messages can be sent over the SSL channel in either direction at the request of thedetector 300 orcentral filter 200.
  • Denunciation transactions are sent over a UDP channel, from a random port on thedetector 300 to the DP port on thecentral filter 200. In the normal case, thecentral filter 200 sends no response at all. In the case of errors, failures, or potential attack, thecentral filter 200 can respond with either a resynch or an error packet. These responses are sent over a TLS channel when it is known that the TLS channel still exists. When the TLS channel does not exist, then the response is sent over UDP - in this case it must be a resynch message, to reestablish the TLS channel. The general rule is that if the incoming packet is well-formed, and thecentral filter 200 believes the client is legitimate, then it sends a resynch message. Otherwise, thecentral filter 200 sends an error message.
  • All other transactions utilize the TLS channel.
  • A. UDP Transactions (Denunciations and Responses)
  • As previously indicated, the HMAC-SHA1 message authentication is computed over the contents of the packet as well as a key that includes the nonce, the day counter, and the global DP port number.FIG. 6 illustrates the HMAC key for UDP requests, prepended to the UDP packet.
  • As indicated above, the number of units since RSTART prevents the DP from being the source of DoS attacks.
  • B. SSL Channel
  • All DP communications that are sent over the TLS channel is broken up into records. In one exemplary embodiment, the maximum size of a single DP record is 16000 bytes. Where the API to the SSL protocol permits, it is a good practice to have exactly one DP record per SSL record. The exemplary DP record begins with, for example, a predefined 4 byte sequence, and ends with another predefined 4 byte sequence. The type of the DP record is encoded (in network byte order) as a 32 bit integer immediately following the start of message marker. The length of the DP record is encoded (in network byte order) as a 32 bit integer immediately following the type.FIG. 7 illustrates an exemplary layout of a DP record header and trailer within the secure reliable stream.
  • The present invention may work in conjunction with one or more supplementary tools. For example, such tools might include Internet server plug-ins for recognition of leveraged Denial of Service attacks, links to various IDS systems (Intrusion Detection Systems), databases for network diagnosis (see discussion above), and methods for providing guidance for placement of Zapper functionality within a given carrier's infrastructure. Illustrative embodiments of the present invention which provide various ones of these supplementary tools will be obvious to those skilled in the art in light of the disclosure herein.
  • System and Article of Manufacture Details
  • As is known in the art, the methods and apparatus discussed herein may be distributed as an article of manufacture that itself comprises a computer readable medium having computer readable code means embodied thereon. The computer readable program code means is operable, in conjunction with a computer system, to carry out all or some of the steps to perform the methods or create the apparatuses discussed herein. The computer readable medium may be a recordable medium (e.g., floppy disks, hard drives, compact disks, memory cards, semiconductor devices, chips, application specific integrated circuits (ASICs)) or may be a transmission medium (e.g., a network comprising fiber-optics, the world-wide web, cables, or a wireless channel using time-division multiple access, code-division multiple access, or other radio-frequency channel). Any medium known or developed that can store information suitable for use with a computer system may be used. The computer-readable code means is any mechanism for allowing a computer to read instructions and data, such as magnetic variations on a magnetic media or height variations on the surface of a compact disk.
  • The computer systems and servers described herein each contain a memory that will configure associated processors to implement the methods, steps, and functions disclosed herein. The memories could be distributed or local and the processors could be distributed or singular. The memories could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices. Moreover, the term "memory" should be construed broadly enough to encompass any information able to be read from or written to an address in the addressable space accessed by an associated processor. With this definition, information on a network is still within a memory because the associated processor can retrieve the information from the network.
  • It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope of the claims.

Claims (8)

  1. A method for defending against unwanted traffic by a target victim, the target victim having one or more destination addresses, the method comprising the steps of:
    determining that unwanted traffic is received by said target victim based on an analysis of packets received from one or more source IP addresses; and
    transmitting a denunciation message to a central filter (200) associated with a service provider, said denunciation message identifying a source address of at least one source computing device whose transmission of packets to said target victim is specified in said denunciation message to be limited or dropped, wherein said denunciation message is transmitted using a denunciation protocol comprising a first reliable TLS channel and a second UDP channel that does not require an acknowledgement from said central filter (200), wherein authentication information is transmitted using the first channel of the denunciation protocol and said denunciation message is transmitted using the second channel of the denunciation protocol.
  2. The method of claim 1, wherein said unwanted traffic comprises a malicious attack or a Denial of Service attack.
  3. The method of claim 1, wherein said denunciation message is sent redundantly to said central filter (200).
  4. The method of claim 1, wherein said denunciation message is self contained.
  5. The method of claim 1, further comprising the steps of receiving a shared state from said central filter and maintaining any changes to said state.
  6. The method of claim 1, wherein said denunciation message includes a sequence number that allows one or more of conflicting denunciation messages from a plurality of said target victims to be reconciled; a malicious attack aimed at said denunciation protocol to be avoided and duplicate copies of said denunciation message to be discarded.
  7. An apparatus (300) for defending against unwanted traffic by a target victim, the target victim having one or more destination addresses, the apparatus comprising:
    a memory (330); and
    at least one processor (320), coupled to the memory (330), operative to:
    determine that unwanted traffic is received by said target victim based on an analysis of packets received from one or more source IP addresses; and
    transmit a denunciation message to a central filter (200) associated with a service provider, said denunciation message identifying a source address of at least one source computing device whose transmission of packets to said target victim is specified in said denunciation message to be limited or dropped and wherein said denunciation message is transmitted using a denunciation protocol comprising a first reliable TLS channel and a second UDP channel that does not require an acknowledgement from said central filter (200), wherein authentication information is transmitted using the first channel of the denunciation protocol and said denunciation message is transmitted using the second channel of the denunciation protocol.
  8. The apparatus of claim 7, wherein said processor (320) is operative to send said denunciation message redundantly to said central filter (200).
EP07867263.1A2006-11-032007-10-23Methods and apparatus for delivering control messages during a malicious attack in one or more packet networksNot-in-forceEP2095603B1 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US11/592,726US8914885B2 (en)2006-11-032006-11-03Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks
PCT/US2007/022446WO2008063344A2 (en)2006-11-032007-10-23Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks

Publications (2)

Publication NumberPublication Date
EP2095603A2 EP2095603A2 (en)2009-09-02
EP2095603B1true EP2095603B1 (en)2016-05-04

Family

ID=39361195

Family Applications (1)

Application NumberTitlePriority DateFiling Date
EP07867263.1ANot-in-forceEP2095603B1 (en)2006-11-032007-10-23Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks

Country Status (6)

CountryLink
US (1)US8914885B2 (en)
EP (1)EP2095603B1 (en)
JP (2)JP2010508760A (en)
KR (1)KR20090094236A (en)
CN (1)CN101536455B (en)
WO (1)WO2008063344A2 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2915598A1 (en)*2007-04-272008-10-31France Telecom METHOD FOR FILTERING UNDESIRABLE FLOTS FROM A MALICIOUS PRESUME TERMINAL
US8009589B2 (en)*2008-02-252011-08-30International Business Machines CorporationSubnet management in virtual host channel adapter topologies
US7895462B2 (en)*2008-02-252011-02-22International Business Machines CorporationManaging recovery and control of a communications link via out-of-band signaling
US8065279B2 (en)*2008-02-252011-11-22International Business Machines CorporationPerformance neutral heartbeat for a multi-tasking multi-processor environment
US8762125B2 (en)*2008-02-252014-06-24International Business Machines CorporationEmulated multi-tasking multi-processor channels implementing standard network protocols
US7949721B2 (en)*2008-02-252011-05-24International Business Machines CorporationSubnet management discovery of point-to-point network topologies
US7962564B2 (en)*2008-02-252011-06-14International Business Machines CorporationDiscovery of a virtual topology in a multi-tasking multi-processor environment
JP5605237B2 (en)*2010-06-302014-10-15沖電気工業株式会社 COMMUNICATION CONTROL DEVICE AND PROGRAM, AND COMMUNICATION SYSTEM
US20120268271A1 (en)*2011-04-192012-10-25Mcmullin Dale RobertMethods and systems for detecting compatibility issues within an electrical grid control system
US8661522B2 (en)*2011-07-282014-02-25Arbor Networks, Inc.Method and apparatus for probabilistic matching to authenticate hosts during distributed denial of service attack
US20130094515A1 (en)*2011-08-312013-04-18Nils GuraSystems, apparatus, and methods for removing duplicate data packets from a traffic flow of captured data packets transmitted via a communication network
JP2014236461A (en)*2013-06-052014-12-15日本電信電話株式会社Interception system, interception server, interception method and program
EP2852118B1 (en)*2013-09-232018-12-26Deutsche Telekom AGMethod for an enhanced authentication and/or an enhanced identification of a secure element located in a communication device, especially a user equipment
US9077639B2 (en)*2013-11-182015-07-07Arbor Networks, Inc.Managing data traffic on a cellular network
US9686077B2 (en)*2014-03-062017-06-20Microsoft Technology Licensing, LlcSecure hardware for cross-device trusted applications
WO2017212689A1 (en)*2016-06-082017-12-14シャープ株式会社Responding device, method for controlling responding device, and control program
US10868828B2 (en)*2018-03-192020-12-15Fortinet, Inc.Mitigation of NTP amplification and reflection based DDoS attacks
CN108494800A (en)*2018-04-272018-09-04广州西麦科技股份有限公司A kind of detection of security data packet and processing method, device, P4 interchangers and medium
CN116527389A (en)*2019-01-302023-08-01帕洛阿尔托网络(以色列分析)有限公司Port scan detection
CN113395247B (en)*2020-03-112023-01-13华为技术有限公司 A method and device for preventing replay attacks on SRv6 HMAC verification

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6111894A (en)*1997-08-262000-08-29International Business Machines CorporationHardware interface between a switch adapter and a communications subsystem in a data processing system
US6711166B1 (en)*1997-12-102004-03-23Radvision Ltd.System and method for packet network trunking
US6505254B1 (en)*1999-04-192003-01-07Cisco Technology, Inc.Methods and apparatus for routing requests in a network
TW453072B (en)*1999-08-182001-09-01Alma Baba Technical Res Lab CoSystem for montoring network for cracker attacic
JP4020576B2 (en)*2000-09-142007-12-12株式会社東芝 Packet transfer method, mobile terminal device and router device
EP1374057A4 (en)*2001-03-202004-11-10Worldcom Inc SYSTEM, METHOD AND DEVICE USING VIRTUAL PRIVATE NETWORKS TO RESIST IP-QoS DENIAL-OF-SERVICE ATTACKS
JP2004260789A (en)2003-02-042004-09-16Hitachi Kokusai Electric Inc Packet communication device
JP2004247955A (en)2003-02-132004-09-02Toshiba Solutions CorpCommunication system and communication method
US7543051B2 (en)*2003-05-302009-06-02Borland Software CorporationMethod of non-intrusive analysis of secure and non-secure web application traffic in real-time
JP3784799B2 (en)*2003-11-132006-06-14日本電信電話株式会社 Attack packet protection system
JP2005159922A (en)2003-11-282005-06-16National Institute Of Information & Communication Technology COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
CN100362802C (en)*2004-06-292008-01-16华为技术有限公司 A Method Against Denial of Service Attack
US20060056403A1 (en)*2004-09-132006-03-16Pleasant Daniel LSystem and method for robust communication via a non-reliable protocol
JP2006109152A (en)*2004-10-062006-04-20Matsushita Electric Ind Co Ltd Connection request device, response device, connection management device, and communication system for communication on network
JP4292213B2 (en)2004-10-122009-07-08日本電信電話株式会社 Denial of service attack defense system, denial of service attack defense method, and denial of service attack prevention program
US20060185008A1 (en)*2005-02-112006-08-17Nokia CorporationMethod, apparatus and computer program product enabling negotiation of firewall features by endpoints
US8370638B2 (en)*2005-02-182013-02-05Emc CorporationDerivative seeds
US20060218636A1 (en)*2005-03-242006-09-28David ChaumDistributed communication security systems
JP2006270894A (en)2005-03-252006-10-05Fuji Xerox Co LtdGateway unit, terminal device, communications system and program
US20060248588A1 (en)*2005-04-282006-11-02Netdevices, Inc.Defending Denial of Service Attacks in an Inter-networked Environment
US20070033650A1 (en)*2005-08-052007-02-08Grosse Eric HMethod and apparatus for defending against denial of service attacks in IP networks by target victim self-identification and control
US7590129B2 (en)*2005-12-072009-09-15Alcatel LucentComplementary residential gateway management
US20080089433A1 (en)*2006-10-132008-04-17Jun Hyok ChoMethod and apparatus for adapting to dynamic channel conditions in a multi-channel communication system

Also Published As

Publication numberPublication date
WO2008063344A2 (en)2008-05-29
US8914885B2 (en)2014-12-16
KR20090094236A (en)2009-09-04
US20080109891A1 (en)2008-05-08
JP2010508760A (en)2010-03-18
CN101536455A (en)2009-09-16
JP2012109996A (en)2012-06-07
CN101536455B (en)2013-01-02
EP2095603A2 (en)2009-09-02
WO2008063344A3 (en)2009-01-15

Similar Documents

PublicationPublication DateTitle
EP2095603B1 (en)Methods and apparatus for delivering control messages during a malicious attack in one or more packet networks
Iyengar et al.QUIC: A UDP-based multiplexed and secure transport
US9438592B1 (en)System and method for providing unified transport and security protocols
TouchDefending TCP against spoofing attacks
O'shea et al.Child-proof authentication for MIPv6 (CAM)
US7370354B2 (en)Method of remotely managing a firewall
US8499146B2 (en)Method and device for preventing network attacks
US9992222B2 (en)Systems and methods for inhibiting attacks with a network
Stewart et al.Stream control transmission protocol (SCTP) dynamic address reconfiguration
US7552323B2 (en)System, apparatuses, methods, and computer-readable media using identification data in packet communications
KR100544182B1 (en) Method and device for managing sliding window in IP security
US20160164848A1 (en)Detection of Stale Encryption Policy By Group Members
US20090144818A1 (en)System and method for using variable security tag location in network communications
US7139679B1 (en)Method and apparatus for cryptographic protection from denial of service attacks
EP1574009B1 (en)Systems and apparatuses using identification data in network communication
KR101263381B1 (en)Method and apparatus for defending against denial of service attack in tcp/ip networks
KR20110087972A (en) Blocking Abnormal Traffic Using Session Tables
TouchRFC 4953: Defending TCP Against Spoofing Attacks
Tuexen et al.Network Working Group R. Stewart Request for Comments: 5061 Cisco Systems, Inc. Category: Standards Track Q. Xie Motorola, Inc.

Legal Events

DateCodeTitleDescription
PUAIPublic reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text:ORIGINAL CODE: 0009012

17PRequest for examination filed

Effective date:20090715

AKDesignated contracting states

Kind code of ref document:A2

Designated state(s):AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

17QFirst examination report despatched

Effective date:20090908

DAXRequest for extension of the european patent (deleted)
RAP1Party data changed (applicant data changed or rights of an application transferred)

Owner name:ALCATEL-LUCENT USA INC.

111ZInformation provided on other rights and legal means of execution

Free format text:AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

Effective date:20130410

D11XInformation provided on other rights and legal means of execution (deleted)
GRAPDespatch of communication of intention to grant a patent

Free format text:ORIGINAL CODE: EPIDOSNIGR1

RIC1Information provided on ipc code assigned before grant

Ipc:H04L 12/801 20130101ALI20160105BHEP

Ipc:H04L 29/06 20060101AFI20160105BHEP

INTGIntention to grant announced

Effective date:20160125

GRASGrant fee paid

Free format text:ORIGINAL CODE: EPIDOSNIGR3

GRAA(expected) grant

Free format text:ORIGINAL CODE: 0009210

RAP1Party data changed (applicant data changed or rights of an application transferred)

Owner name:ALCATEL LUCENT

AKDesignated contracting states

Kind code of ref document:B1

Designated state(s):AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

REGReference to a national code

Ref country code:GB

Ref legal event code:FG4D

REGReference to a national code

Ref country code:CH

Ref legal event code:EP

REGReference to a national code

Ref country code:AT

Ref legal event code:REF

Ref document number:797760

Country of ref document:AT

Kind code of ref document:T

Effective date:20160515

REGReference to a national code

Ref country code:IE

Ref legal event code:FG4D

REGReference to a national code

Ref country code:DE

Ref legal event code:R096

Ref document number:602007046206

Country of ref document:DE

REGReference to a national code

Ref country code:NL

Ref legal event code:MP

Effective date:20160504

REGReference to a national code

Ref country code:LT

Ref legal event code:MG4D

REGReference to a national code

Ref country code:FR

Ref legal event code:PLFP

Year of fee payment:10

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:NL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:FI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:LT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

REGReference to a national code

Ref country code:AT

Ref legal event code:MK05

Ref document number:797760

Country of ref document:AT

Kind code of ref document:T

Effective date:20160504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:ES

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:GR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160805

Ref country code:LV

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:PT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160905

Ref country code:SE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:IT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:RO

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:SK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:EE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:CZ

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:DK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

REGReference to a national code

Ref country code:DE

Ref legal event code:R097

Ref document number:602007046206

Country of ref document:DE

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:AT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:PL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:BE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

PLBENo opposition filed within time limit

Free format text:ORIGINAL CODE: 0009261

STAAInformation on the status of an ep patent application or granted ep patent

Free format text:STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26NNo opposition filed

Effective date:20170207

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:SI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

REGReference to a national code

Ref country code:CH

Ref legal event code:PL

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:MC

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

REGReference to a national code

Ref country code:IE

Ref legal event code:MM4A

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:LI

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20161031

Ref country code:CH

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20161031

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:LU

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20161023

REGReference to a national code

Ref country code:FR

Ref legal event code:PLFP

Year of fee payment:11

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:IE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20161023

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:HU

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date:20071023

Ref country code:CY

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:TR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

Ref country code:MT

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20161031

Ref country code:IS

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:BG

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20160504

REGReference to a national code

Ref country code:FR

Ref legal event code:PLFP

Year of fee payment:12

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:FR

Payment date:20180913

Year of fee payment:12

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:DE

Payment date:20181009

Year of fee payment:12

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:GB

Payment date:20181017

Year of fee payment:12

REGReference to a national code

Ref country code:DE

Ref legal event code:R119

Ref document number:602007046206

Country of ref document:DE

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:DE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20200501

GBPCGb: european patent ceased through non-payment of renewal fee

Effective date:20191023

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:FR

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20191031

Ref country code:GB

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20191023


[8]ページ先頭

©2009-2025 Movatter.jp